Subscribe to CIO Magazine »

Google patches 9 Chrome bugs, pays more to top researchers

Sixth security update for Chrome 17 since its debut on Feb. 8

Google yesterday patched nine vulnerabilities in Chrome in the sixth security update to Chrome 17, the edition that launched Feb. 8.

Wednesday's update was the first since the Chrome security team issued a pair of quick fixes during the "Pwnium" hacking event held March 7-9 at the CanSecWest security conference.

Six of the nine bugs patched Wednesday were rated "high," the second-most dire ranking in Google's threat system. One was marked "medium," and the remaining two were labeled "low."

Google paid $5,500 in bounties to four researchers for reporting five bugs. The four other vulnerabilities were uncovered by members of Google's own security team or were too minor to be eligible for a bonus.

Three of the four researchers who reported flaws fixed in Chrome 17 yesterday have been recently recognized by Google.

Sergey Glazunov, who received a $2,000 bounty for submitting a bug described by Google as "cross-origin violation with 'magic iframe,'" was one of two $60,000 prize winners at Pwnium earlier this month.

Glazunov was the first to claim cash at Pwnium , the Chrome-only hacking challenge that Google created after it withdrew from the long-running Pwn2Own contest over objections about the latter's exploit reporting practices.

Two others, Arthur Gerkis and a researcher known as "miaubiz," received $1,000 and $2,000, respectively, for bugs that Google patched yesterday.

Gerkis and miaubiz were two of the three outside bug hunters who were given special $10,000 bonuses three weeks ago for what Google called "sustained, extraordinary" contributions to its vulnerability reporting program.

So far this year, Google has paid nearly $200,000 to outside researchers through its bug bounty and Pwnium programs.

Google will not be patching a Chrome bug revealed in "Pwn2Own," the other hacking contest that ran at CanSecWest.

At Pwn2Own, a team from the French security firm Vupen exploited Chrome by using a one-two punch of a bug in Flash Player -- which Google bundles with its browser -- and a Chrome "sandbox escape" vulnerability.

Because Pwn2Own sponsor HP TippingPoint's Zero Day Initiative (ZDI) bug bounty program does not require researchers to disclose sandbox escape vulnerabilities, Google was not told how the Vupen team hacked Chrome.

Yesterday's update to Chrome 17 can be downloaded for Windows, Mac OS X and Linux from Google's website. Users running the browser will receive the new version automatically through its silent, in-the-background update service.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer , on Google+ or subscribe to Gregg's RSS feed . His email address is .

See more by Gregg Keizer on .

Read more about security in Computerworld's Security Topic Center.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Apple, Google, Hewlett-Packard, HP, Linux, Microsoft, TippingPoint, TippingPoint, Topic, West
References show all
Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Latest Blog Posts
  • Research firm Radicati names Google Apps for Business the leader in cloud business email
    Radicati Market Quadrants illustrate how individual vendors fit within a specific technology market, classifying them as niche specialists, up-and-coming pioneers, today’s top players or yesterday’s leaders. In August 2013, Radicati used this model t o assess and compare 14 cloud business email providers, including Google.
    Learn more »
  • CISO 2013 Security Insights: A new standard for security leaders
    Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
    Learn more »
  • The CIO Paradox
    As there are timeless leadership principles underlying IT value, there are unfortunately also timeless challenges that thwart the IT organisations efforts and make for a rocky path to CIO success. These are the inherent contradictions we call the CIO Paradox.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments